-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update dependency n8n to v1.52.2 #6266
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Auto-approved because label type/renovate is present.
🔍 Vulnerabilities of
|
digest | sha256:62f5341123275ba3ccdf83b10a3a760775ba245d7c18072eb6dbdf9532c11cdc |
vulnerabilities | |
platform | linux/amd64 |
size | 157 MB |
packages | 1397 |
protobufjs
|
Affected range | >=7.0.0 |
Fixed version | 7.2.5 |
CVSS Score | 9.8 |
CVSS Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Description
protobuf.js (aka protobufjs) 6.10.0 until 6.11.4 and 7.0.0 until 7.2.4 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty. NOTE: this CVE Record is about
Object.constructor.prototype.<new-property> = ...;
whereas CVE-2022-25878 was aboutObject.__proto__.<new-property> = ...;
instead.
pdfjs-dist 2.16.105
(npm)
Affected range | <=4.1.392 |
Fixed version | 4.2.67 |
Description
Impact
If pdf.js is used to load a malicious PDF, and PDF.js is configured with
isEvalSupported
set totrue
(which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain.Patches
The patch removes the use of
eval
:
mozilla/pdf.js#18015Workarounds
Set the option
isEvalSupported
tofalse
.References
fast-xml-parser 4.2.5
(npm)
pkg:npm/fast-xml-parser@4.2.5
Uncontrolled Resource Consumption
Affected range | <4.4.1 |
Fixed version | 4.4.1 |
CVSS Score | 7.5 |
CVSS Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Description
Summary
A ReDOS exists on currency.js was discovered by Gauss Security Labs R&D team.
Details
https://github.com/NaturalIntelligence/fast-xml-parser/blob/master/src/v5/valueParsers/currency.js#L10
contains a vulnerable regexPoC
pass the following string '\t'.repeat(13337) + '.'
Impact
Denial of service during currency parsing in experimental version 5 of fast-xml-parser-library
identity 3.4.2
(npm)
pkg:npm/%40azure/identity@3.4.2
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Affected range | <4.2.1 |
Fixed version | 4.2.1 |
CVSS Score | 5.5 |
CVSS Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
Description
Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability.
semver 5.3.0
(npm)
pkg:npm/semver@5.3.0
Inefficient Regular Expression Complexity
Affected range | <5.7.2 |
Fixed version | 5.7.2 |
CVSS Score | 5.3 |
CVSS Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
Description
Versions of the package semver before 7.5.2 on the 7.x branch, before 6.3.1 on the 6.x branch, and all other versions before 5.7.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.
Attempting automerge. See https://github.com/uniget-org/tools/actions/runs/10184177518. |
PR is clean and can be merged. See https://github.com/uniget-org/tools/actions/runs/10184177518. |
This PR contains the following updates:
1.51.2
->1.52.2
Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Release Notes
n8n-io/n8n (n8n)
v1.52.2
Compare Source
Bug Fixes
n8n.workflow.failed
(#10253) (70aa8fd)v1.52.1
Compare Source
Bug Fixes
v1.52.0
Compare Source
Bug Fixes
$secrets
to resolve on credentials (#10093) (bf57f38)Features
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.